US5191613A - Knowledge based system for document authentication - Google Patents
Knowledge based system for document authentication Download PDFInfo
- Publication number
- US5191613A US5191613A US07/792,904 US79290491A US5191613A US 5191613 A US5191613 A US 5191613A US 79290491 A US79290491 A US 79290491A US 5191613 A US5191613 A US 5191613A
- Authority
- US
- United States
- Prior art keywords
- document
- user
- data
- processor
- authentication signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Definitions
- This invention relates to computer systems and, in particular, to apparatus for providing a document authentication and authenticity capability for the computer system, to produce an electronic document which satisfies the legal requirements for contracting as applied to printed documents.
- a first draft is generated.
- the draft is sent by the vendor to the buyer.
- the buyer revises this draft copy and sends it back to the vendor.
- This process generally takes several iterations between the parties before a final written contract is approved and executed to consummate the deal.
- the contracting parties may take advantage of a computerized word processor that electronically retains the document on magnetic media (tape, disk) to allow easy retrieval, modification, transmission and storage. Document transmission between parties can be accomplished by teletype/facsimile and overnight mail.
- This apparatus produces a final authenticated document using computerized techniques, which document satisfies the legal document authentication and authenticity requirements traditionally associated with printed documents.
- this apparatus eliminates many of the problems spawned by execution of paper contracts and the use of the postal service, such as the "battle of the forms" and the "mailbox rule".
- the document authentication apparatus offers a number of hardware/software architectural options to provide document authentication and authenticity capability.
- Document authentication requires that the person to be charged apply an authenticating mark on the document indicating intent to authenticate the document. This requirement is analogous to a signature on a printed document and is implemented in the document authentication apparatus electronically through the use of both hardware and software.
- the document authentication process is activated as part of a program which verifies the identicalness of the document at the transmitting and receiving station through a high speed comparison, locks in the document such that no modification can occur and then awaits authentication handshakes from the two end points.
- the document authentication apparatus prompts the parties to authenticate the document by appending an electronic signature thereto.
- the actual "signing" or authenticating of the electronic document can be implemented as an additional password step utilizing personnel identity validation apparatus. Therefore, two levels of password protection can be used such that there exists a separate "document authenticating password". Obviously, the more sophisticated the system, the more assured the court will be that the document authentication is valid.
- the authentication of the document by the contracting parties consummates the execution of the document.
- the document authentication apparatus responds to the authentication operation by providing sufficient safeguards to insure that the contents of the file have not been modified or altered following the consummation of the contract without the alteration being detectable. This is typically accomplished by the generation of a "digital signature" that "fingerprints" the document such that not even a single bit of the document can be altered without this change being reflected in the digital signature.
- the authenticated document with the digital signature appended thereto can then be electronically archived on electronic media as a permanent document.
- the system can review its internal rule set to determine whether these modifications are acceptable, in that the changes fall within acceptable predetermined limits. Once acceptance has been noted, the system can then automatically authenticate the document independent of human intervention. This is especially efficient in the arena of Electronic Document Interchange (EDI), where standard form messages are exchanged between the parties to order and invoice goods. These messages do not presently constitute a contract since there is no authentication of an agreed upon document.
- EDI Electronic Document Interchange
- the present apparatus automatically authenticates the document in the EDI environment by using the original EDI order as the document and requesting that the essential data elements of the order, with optional additional recipient identification data, be echoed back to the transmitting party to signify acceptance of the offer as embodied in the EDI order. The identicalness of the echoed terms and conditions to those originally transmitted is determined by the system of the present invention and, if a match occurs, the apparatus authenticates the document to create a binding contract between the parties.
- FIG. 1 illustrates, in block diagram form, the structure of a multi-processor environment in which the document authentication apparatus is installed on one or more of the processors;
- FIG. 2 illustrates, in block diagram form, the structure of a typical document authentication apparatus
- FIGS. 3 to 5 illustrate, in flow diagram form, the operational steps of a document authentication process
- FIG. 6 illustrates, in flow diagram form, the specifics of the EDI contracting process.
- the present document authentication apparatus produces a final authenticated document using computerized techniques, which document satisfies the legal document authentication and authenticity requirements traditionally associated with printed documents.
- this apparatus eliminates many of the problems spawned by execution of paper contracts and the use of the postal service, such as the "battle of the forms" and the "mailbox rule".
- the document authentication apparatus offers a number of hardware/software architectural options to provide document authentication and authenticity capability.
- Document authentication requires that the person to be charged apply an authenticating mark on the document indicating intent to authenticate the document. This requirement is analogous to a signature on a printed document and is implemented in the document authentication apparatus electronically through the use of both hardware and software.
- the actual "signing" or authenticating of the electronic document can be implemented as an additional password step utilizing personnel identity validation apparatus. Therefore, two levels of password protection can be used such that there exists a separate "document authenticating password.”
- Such authentication is real-time and can be both hardware and software executable, i.e., password and physical confirmation. Obviously, the more sophisticated the system, the more assured the court will be that the document authentication is valid, and that the contents of the file have not been modified or altered following the consummation of the contract without the alteration being detectable.
- the system can review its internal rule set to determine whether these modifications are acceptable, in that they fall within predetermined acceptable limits. Once acceptance has been noted, the system can then automatically authenticate the document, independent of human intervention. This is especially efficient in the arena of Electronic Document Interchange (EDI), where standard form messages are exchanged between the parties to order and invoice goods. These messages do not presently constitute a contract since there is no authentication of an agreed upon document.
- EDI Electronic Document Interchange
- the present apparatus automatically authenticates the document in the EDI environment by using the original EDI order as the document and requesting that the essential data elements of the order, with optional additional recipient identification data, be echoed back to the transmitting party to signify acceptance of the offer as embodied in the EDI order. The identicalness of the echoed terms and conditions to those originally transmitted is determined by the system of the present invention and, if a match occurs, the apparatus authenticates the document to create a binding contract between the parties.
- a telegram is generated as electrical signals transmitted over electrical conductors or microwave transmissions.
- a transmission which generates a telegram is clearly an intangible method of exchanging information to produce a human readable document--a printout.
- a computer transmission is another intangible method of exchanging information to produce a human readable document.
- the computer media on which an electronic contract is stored as data also provides a permanent record to which a court can turn in the event of a dispute.
- the lifetime of computer media and the state of the art in storing this media not only ensures the existence of a representation of the parties' understanding, but endures beyond the lifetime of paper. Should the contents of an electronic contract be brought into question, the data comprising the terms and conditions of the electronic contract is immediately retrievable and transformable to a human readable document.
- UCC Uniform Commercial Code
- the Uniform Commercial Code defines "signed” to include "any symbol executed or adopted by a party with present intention to authenticate a writing.”
- authentication is included to "make it clear that a complete handwritten signature is not required.”
- a signature appended to a contract must establish an "evidentiary connection to the signatory.”
- the state of the art does not preclude the ability to authenticate in the context of electronic contracting. Additionally, the present laws may be interpreted to encompass state of the art authenticating methods.
- the signature must be made or adopted with the declared or apparent intent of authenticating the writing relied upon as a memorandum, and not by way of mere recital or identification. Especially if the signature is affixed by means other than the hand of the signer, . . . it is essential that the act be done with intent to authenticate the instrument.
- This type of security arrangement although more sophisticated than a locked room, is still subject to circumvention. Therefore, the state of the art offers still more sophisticated methods of preventing access, and, in particular, access to the computer files.
- Passwords are typically used to validate the identity of the user.
- the software operating the computer prompts the user to enter a password that is 5 theoretically known only to the user before access to
- the computer's files is granted. Therefore, access is password protected such that only a single user may gain entry.
- the accuracy of user identity validation can be improved by the addition of various peripheral devices that measure some immutable physical characteristic of the user. These devices include fingerprint scanners, voiceprint identifiers, retina scanners, etc. Each of these devices can be preprogrammed to respond to only the authorized user and operate with a high level of confidence.
- sophisticated hardware and software methods exist to secure access to computer files, i.e., the locked cabinet analogy.
- Such authentication is real-time and can be both hardware and software executable, i.e., password and physical confirmation. Obviously, the more sophisticated the system, the more assured the court will be that the document authentication is valid, and that the contents of the file have not been modified or altered following the consummation of the contract without the alteration being detectable.
- One method of ensuring document authenticity is the use of a "digital signature.”
- Computer software which employs a complex mathematical formula produces a series of 0 and 1 bits that are appended to the file to uniquely identify the contents of the file. This is accomplished by the use of a "hashing routine" that uses each character in the file in a complicated mathematical computation to obtain, for example, a 128 character digital signature.
- the digital signature is dependent on the contents of the file and if even a single bit of the file is changed, the digital signature does not match. If a single character of the file is changed, then approximately 50% of the characters in the digital signature will change.
- the probability of two documents having the same digital signature using this procedure is less than one in 1,000 trillion. This adequately ensures that the contents of the original contract cannot be altered without the modification being detectable.
- Alterations of the contract during transmission is particularly a concern with respect to written and electronic contracts.
- the written document can easily pass through human hands that can expertly alter the contents of the paper expression. Detecting a switch in paper documents is nearly impossible.
- Electronic document transmission is clearly superior to paper documents in that sophisticated technology not only allows for secure transmissions, but offers technology to detect any tampering. If security is not a factor and the document is sent via common carrier telecommunication facilities, the transmission is sent concurrently with many other transmissions.
- anyone can access these transmissions, but finding a specific transmission and associating it with a particular sender is difficult considering the number of communication channels supported by one common carrier facility. Physical "wiretapping" requires access to a user's facilities, and thus, is equally prohibitive if adequate on site security measures are employed.
- An additional level of security is obtained by the use of encryption, where the entire document is translated into coded form using a secret cipher key. This protects the document from being read by third parties, but does not protect sender and receiver from fraud committed by each other, since both have knowledge of the cipher key. More complex encryption systems that use a third party trustee are available, but are costly to implement. Therefore, technology exists which serve to secure transmissions and permit authentication of agreed upon terms and conditions.
- the National Bureau of Standards has adopted an encryption algorithm known as the Data Encryption Standard (DES). This encryption key uses 64 bits and therefore does not require much processing time or assume much storage space. Additionally, the associated software is relatively inexpensive.
- DES Data Encryption Standard
- This system uses two encryption keys.
- a "private key” is used by the document sender to scramble the data while a "public key”, known to the document recipient, is used to decode the received document. Since the registered public key will unscramble only data that was scrambled with the private key, the parties can identify each other.
- This system is analogous to handwritten signatures in that the electronic signature can be verified but not easily forged. This system can be used in lieu of the above described DES system where the trustworthiness of the other party is in doubt.
- the document authentication apparatus is typically installed as part of a computer system, either a personal computer or a minicomputer.
- the apparatus illustrated in FIG. 1 represents the interconnection of a plurality of processors, each of which is associated with one of the parties to a contract negotiation, and one or more of which processors are equipped with the document authentication apparatus. These parties can be geographically separated, such as in different parts of the country, or can be within the same building.
- a typical system installation 102 can be processor 124, equipped with disk memory 125, personnel identification apparatus 141 and one or more terminals 121.
- the party at terminal 121 is also equipped with a telephone 122 for voice communication with the other parties to the contract negotiation.
- a communication interface 123-0 is provided to interconnect terminal 121 and telephone 122 via voice/data interface 123-0 and leads 127-0.
- switching system 120 interconnects via trunk circuits 126-0 to 126-n to the common carrier communication facilities, represented in FIG. 1 as packet switching network 100.
- the switching system 120 can be a telephone switching system that establishes voice communication connections from telephone station set 122 and data communication connections from terminal 121 and processor 124 to packet switching system 100.
- processor 124 is equipped with document authentication software 144 that is described in detail below.
- the document authentication software 144 provides control of the documentation authentication process and provides all the elements necessary to satisfy the legal requirements of a contract.
- Another alternative typical system installation 103 can be processor 134, equipped with disk memory 135 and personnel identification apparatus 142.
- Processor 134 is also equipped with document authentication software 143 that is described in detail below.
- the document authentication software 143 provides control of the documentation authentication process and provides all the elements necessary to satisfy the legal requirements of a contract.
- one or more personal computers 131 provide distributed processing capability.
- the user at personal computer 131 is also equipped with a telephone 132 for voice communication with the other parties to the contract negotiation.
- a voice/data communication interface 133-0 is provided to interconnect personal computer 131 and telephone 132 with switching system 130.
- switching system 130 is connected via trunk circuits 136-0 to 136-n with the common carrier communication facilities, represented in FIG. 1 as packet switching network 100.
- the switching system 130 can be a telephone switching system that establishes voice communication connections from telephone station set 132 and data communication connections from processor 134 and personal computer 131 to packet switching system 100.
- the voice and data communication connections are established as a single combined communication connection.
- the present such combined communication connections are referred to as Integrated Services Digital Network (ISDN) connections.
- ISDN communication methodology provides a combined voice/data communication path that integrates telephone station set 132 with personal computer 131 to enable the user to have the full spectrum of communication capability with the other parties via a single interface and communication connection.
- the final computer system 101 illustrated as a block in Figure and parallels the structure of system installation 102 or 103 and is illustrated for the purpose of discussing three party contracts and/or the use of a third-party trustee as is described in further detail below.
- the document authentication software such as 143, is illustrated in further detail in FIG. 2.
- This software includes document authentication control element 201 which serves as the basic program control block.
- Various subroutines (202-207) are connected to document authentication control 201 to provide the specialized features and hardware control elements.
- File lock element 202 controls access to the document or file such that only the contracting parties can access the document. Access to the document is rigorously controlled to prevent tampering with the document contents during editing and execution.
- Communication control element 203 manages all communication among the processors to limit the possibility of unauthorized users from accessing the document.
- Encryption/decryption element 204 provides the capability to encode and decode the document for transmission over the packet switching network 100 to prevent interception of the document contents during the transfer of the document among the parties.
- the personnel identification sensor scanner element 205 provides control over the parties identification verification process.
- Digital signature generator element 206 produces a digital signature that is appended to the final signed document to prevent the contents of the document from being altered without detection. The digital signature thereby supplies document content validation for archival purposes.
- the file archive element 207 relocates the executed document to a secure data storage media location for long term archival purposes. This element also manages the file lock and access control software that prevents unauthorized or inadvertent file access.
- FIGS. 3 to 5 the process of authenticating a document is described in flow diagram form in FIGS. 3 to 5, with reference to the hardware and software elements of FIGS. 1 and 2.
- a user at system installation 102 and a user at system installation 103 are the two parties to a contract for the purchase of goods. These two parties are not colocated and for description purposes are assumed to be located in Seattle, Wash. and Omaha, Nebr., respectively.
- the two parties are linked by the common carrier facilities 100 available to the public, such that both voice and data communications are concurrently carried via these common carrier facilities 100 between the two parties.
- the document or contract of interest to the two parties resides on processor 134 although copies of this document can also be stored on personal computer 131 and processor 124.
- the document editing process typically begins with a user (first party) logging on to processor 134 and accessing a file. This is accomplished at step 301 by first party at personal computer 131, for example, unlocking the personal computer 131 with a key as is found on the IBM personal computers. First party then establishes a data communication connection via voice/data interface 133-0, switching system 130, voice/data interface 133-9 to processor 134. Once connected to processor 134, first party logs into the processor 134 at step 301 by providing a user identification password in response to a prompt from processor 134. This password should be known only to first party and uniquely identifies first party to processor 134, thereby preventing unauthorized parties or other users from accessing first party's files resident on processor 134.
- first party requests access to a file named "contract” for the purpose of editing this file. If this file is stored in cache memory of processor 134, it is immediately transmitted to and displayed on the screen of personal computer 131. If the file is archived in disk memory 135 at step 303, processor 134 requests file "contract” from disk memory 135 that serves processor 134. In response to such a request, disk memory 135 transfers file “contract” to processor 134 which transmits file “contract” via switching system 130 to personal computer 131, where the file is displayed for first party to edit.
- first party elects to unilaterally edit the file "contract", this is accomplished in well known fashion at step 304.
- the edited file can be saved at step 305 and editing terminated.
- first party can request the addition of the other contracting party (second party) who is a user on processor 124. This is accomplished by first party requesting access to the document authentication software 143 resident on computer 134 at step 306.
- Document authentication software 143 interfaces with first party via document authentication control 201 which provides a user friendly interface to enable a user to step through the document authentication process.
- Document authentication control 201 at step 307 produces a user prompt/query or a menu to enable first party to signify the requested action.
- first party at step 308 designates file "contract" as the document of interest.
- Document authentication control 201 activates subroutine file lock 202 which loads file "contract" into the document authentication software 143 and prevents uncontrolled access or modification of this file.
- the file can be edited by preauthorized users (the contracting parties): first and second parties.
- first party in response to a query from document authentication control 201, requests that a communication connection be established to second party.
- Document authentication control 201 activates communication control 203 to establish voice and data communication connections to second party. This is accomplished by communication control 203 at step 309 either querying first party or accessing a predetermined list of contracting parties to obtain the identification of the contracting parties for the file "contract”.
- communication control 203 establishes data communication connection via communication interface 133-9, switching system 130, communication interface 136-0, packet switching system 100, communication interface 126-0, switching system 120, communication interface 123-0 to processor 124 and terminal 121.
- switching system 130 may establish a voice communication connection from telephone station set 132, voice/data communication interface 133-0, switching system 130, communication interface 136-0, packet switching system 100, communication interface 126-0, switching system 120, voice/data communication interface 127-0 to telephone station set 122.
- the second party at terminal 121 can access file "contract" as if it were resident on processor 120 and can simultaneously discuss the contents of file "contract" via telephone station set 122.
- both first party and second party concurrently view the same document on their respective terminals 131, 121 and can exchange verbal communication via their respective telephone station sets 132, 122. In this fashion, the contract can be edited in real time and a more timely resolution of differences reached.
- second party at terminal 121 can be connected on a data communication connection via voice/data communication interface 123-0, switching system 120, data communication interface 123-9, processor 124, data communication interface 123-9, switching system 120, communication interface 126-0 to packet switching system 100.
- voice/data communication interface 123-0 switching system 120, data communication interface 123-9, processor 124, data communication interface 123-9, switching system 120, communication interface 126-0 to packet switching system 100.
- the exact details of the voice and data communication connections are a function of the implementation details of the switching systems and the computer equipment used.
- Communication control 203 therefore views the communication connections as the interconnection of first party at one of the communication lines of switching system 130 with at least one other contracting party connected to corresponding ones of communication interfaces 136-0 to 136-n that interconnect these other contracting parties with system installation 103 via packet switching system 100.
- Editing of the file "contract” can now be accomplished by the plurality of contracting parties in real time at step 312. All the contracting parties (first and second) have editing capability via their respective terminals 131, 121 and voice communication capability via their respective telephone station sets 132, 122. If the parties agree to store and not authenticate this file, at step 313 document authentication control 201 proceeds to store and lock the file "contract”. This is controlled by file lock software 202 which disconnects the parties from the communication connections and proceeds to store and lock the file "contract” in memory such as disk drive 135.
- document authentication control 201 activates file lock software 202 to place the file "contract” in a read-only mode for authentication purposes to prevent any further changes to this file by any of the contracting parties, to thereby avoid tampering.
- document authentication control 201 queries all the parties to determine whether distributed review of the file "contract" is desired. If not, the authentication process continues at step 321 where the personnel identification process is initiated. However, if distributed review is requested, the document authentication control 201 at step 316 enters the encryption session of encryption/decryption software 204.
- encryption/decryption software 204 encrypts the file "contract" using one of the well-known processes described above, such as the Data Encryption Standard.
- encryption/decryption software 204 requests communication control 203 to transmit the encrypted file to all the parties via the existing communication connections.
- each party can use decryption software, resident on their respective processors 124, 134, to decrypt the received encrypted file at step 318.
- the processors 124, 134 can then at step 319 compare the decrypted file to their copy of the file as recorded in their "own copy” version to insure that no discrepancies exist in the file "contract” as presently stored in the locked file form in document authentication software 143.
- each user can elect to exit from the authentication process or continue with the formalization of the file "contract".
- An alternative to distributing the file to all the contracting parties is for document authentication software 143 to compare the copy of the file stored on processor 124 with the copy of the file stored on processor 134 for identicalness. Then, at step 316, processor 124 encrypts the version of file "contract” that is stored on processor 124 and transmits the encrypted file at step 317 to processor 134 over the above-described data communication connection.
- the recipient party at processor 134 is document authentication software 143 which decrypts the received encrypted file and at step 319 compares the received decrypted file with the version stored on processor 134. If the two versions of the file "contract" match, at step 320, the document authentication process continues as noted above.
- the personnel identification process is initiated at step 321 by all the authenticating parties assenting to the form and content of the file "contract" as is presently stored in the document authentication software 143.
- the assent is obtained by personnel identification process 205 polling all the parties seriatim to obtain their initial confirmation that authentication is appropriate.
- personnel identification process 205 enables and scans a sensor (ex. device 142) associated with one of the contracting parties.
- the sensors as described above, can be as elemental as a prompt to the terminal associated with the selected party to enter a password that is theoretically known only to the selected party.
- the accuracy of personnel identity validation can be improved by the addition of various peripheral devices 142, 141 that measure some immutable physical characteristic of the party.
- the personnel identification process 205 can signal a peripheral device 142 that is colocated with the selected party's terminal 131 to obtain data therefrom indicative of some selected immutable physical characteristic of the selected party.
- personnel identification process 205 compares the data received from the selected sensor 142 with data stored in its memory indicative of the correct party identification.
- Some sensors 142 themselves include preprogrammed data that performs the comparison test and outputs a confirmation or a denial of the party's identification.
- step 324 if there is not a match, processing is aborted and an error condition is reported to all parties. If a validation is determined at step 324, then the next party in the process is confirmed until all the parties are determined at step 325 to have been validated. Once validation of the identification of all the contracting parties is obtained, then the file "contract" is "signed" by all the parties and the legal document has been executed electronically.
- document authentication software 143 can append a digital signature to the executed file to prevent undetected unauthorized tampering with the contents of the file "contract". This is accomplished at step 326 by document authentication control 202 activating digital signature generator 206 to produce a digital signature based on the contents of file "contract".
- the digital signature can be generated by either hardware or software, depending upon the particular process selected.
- the digital signature is typically generated by computer software which employs a complex mathematical formula to produce a series of 0 and 1 bits that are appended to the file to uniquely identify the contents of the file. This is accomplished by the use of a "hashing routine" that uses each character in the file in a complicated mathematical computation to obtain, for example, a 128 character digital signature.
- the digital signature is dependent on the contents of the file and if even a single bit of the file is changed, the digital signature does not match. If a single character of the file is changed, then approximately 50% of the characters in the digital signature will change. The probability of two documents having the same digital signature using this procedure is less than one in 1,000 trillion. This adequately ensures that the contents of the original contract cannot be altered without the modification being detectable.
- document authentication control 201 transfers the authenticated file and its associated appended digital signature to file archive process 207.
- file archive process 207 stores the file in memory, such as disk memory 135.
- copies of the file are transmitted at step 328 to all the contracting parties to provide each party with an executed digitally signed copy of the file "contract".
- the transmission can include encryption as described above.
- the contract has been reviewed by all parties, "signed" by all parties using special authentication processes, and “sealed” by use of a digital signature.
- the standard business practice of storing multiple copies can be used by any or all of the contracting parties.
- the electronic data can be stored on multiple disks or on a memory that provides a dual copy protection scheme. As can be seen from this description, no paper copy of the contract has been generated, nor needs to be produced.
- third party trustees An alternative to the above-described process is the use of third party trustees.
- the third party is a fiduciary, such as a bank, that has no proprietary or financial interest in the subject matter of the contract or any financial ties to any of the contracting parties.
- the third party at system installation 1 1 (details not shown, but similar or identical to any of the party's computer systems) is the repository for the document authentication software and the file "contract”.
- the third party controls the communication connections and can even provide facilities of their own at which the respective parties in Seattle and Omaha can visit to access terminals 121, 131 and personnel identification devices 141, 142 that are controlled by the third party. It is evident from the above description, that such a variation can be accomplished in straightforward fashion based upon the description provided herein.
- the above-described apparatus provides document authentication capability for any multi-party or single party situation.
- a first party transmits an electronic order to a second party.
- the transmission of this electronic order is typically handled by a common carrier local area network, which electronically deposits the order in the electronic mailbox of the second party recipient.
- the second party periodically retrieves the electronic messages deposited in this mailbox and acts on the messages retrieved therefrom.
- no contract is created.
- the failure of the second party to respond to and authenticate the first party's offer creates a situation where the essential elements of a contract as outlined above have not been satisfied.
- some acceptance of the first party's offer must be transmitted by the second party to the first party.
- the document authentication apparatus includes a knowledge based system that enables this essential contract element to be implemented in automatic form.
- the second party on receipt of the first party's offer, transmits an electronic (ex.--EDI standard form) response to the first party signifying acceptance of the offer, an electronic contract is formed.
- This response can be an echoing of the basic terms of the first party's offer, along with an identification of the second party.
- the identification can include a password to validate the identity of the second party, but this is not essential.
- the knowledge based system monitors all offers transmitted by the first party, and creates a library or listing of all outstanding offers.
- This list would typically include: the identity of the second party, quantity and price of goods, shipping date and other essential terms of the offer, such as expiration date of the offer.
- second party Upon receipt of this offer, second party transmits the data stored in the list, as obtained from the originally transmitted offer, to the first party along with data identifying the second party.
- the knowledge based system compares the received acceptance from the second party with the offer data stored in the list. If there is a match, the document authentication system notes this document as authenticated.
- the difference between this transaction and the human user based transaction described above, is that the basic working relationship between the parties is typically well-established and each offer and acceptance interchange simply represents another transaction in a long sequence of transactions under the umbrella of the underlying business relationship, which may be described in an underlying business relationship contract.
- Each subsidiary interchange is itself a contract, with reference to additional terms and conditions as enumerated in the business relationship contract.
- the subsidiary interchange does not require significant human involvement and the offer is created by a human, but its acceptance, and conformance checking with the offer can be performed by the document authentication system without the need for human intervention.
- the failure of the acceptance to match the offer can be processed by the knowledge based system in a number of ways.
- a simple response is to alert a human operator of the failure to match and expect manual correction of any discrepancy.
- Another capability of the knowledge based system is to determine whether the acceptance, or counteroffer--since it does not match the offer, falls within a predetermined range of variability.
- the knowledge based system contains a set of rules indicative of acceptable bounds on substantive contract terms. Therefore, when the counteroffer is received from the second party, the knowledge based system identifies the variation between the offer and counteroffer. This variation is then factored using the preprogrammed rule set in the document authentication system to determine whether the change in substantive offer terms is acceptable to the first party.
- the counteroffer is accepted and authenticated, and the revised and acceptable terms transmitted to the second party as confirmation of the counteroffer.
- the knowledge based system can itself use its embedded rule set to make a new offer to the second party and reinitiate the original offer process.
- the knowledge based system can request human intervention if the counteroffer varies in substantive terms from the offer by greater than a predetermined amount.
- An example of this process is illustrated in flow diagram form in FIG. 6.
- An offer of purchase of 10,000 machine screws at $25.00/100 to be shipped in two weeks C.O.D. is transmitted by knowledge based system 210 of first party to second party at step 601.
- these terms and conditions are written into a table of outstanding offers 211 contained within knowledge base system 210.
- knowledge based system 210 receives from packet switching network 100 a counteroffer transmitted by second party of 15,000 machine screws at $24.50/100 to be shipped in three weeks C.O.D.
- Knowledge based system 210 at step 604 strips the data from the counteroffer and at step 605 compares each segment of the counteroffer with the originally transmitted offer as stored in table 211.
- knowledge based system 210 compares the magnitude of the discrepancy with the permissible threshold for this item as stored in knowledge based system 210. As can be seen from the entries in table 211 in FIG. 2, the quantity is permitted to vary by 20% and the counteroffer represents a 50% change from the offer. The remaining items in the counteroffer fall within the range of permitted values noted in table 211. Therefore, at step 607, the knowledge based system signifies failure to match terms and conditions. At step 608, knowledge based system 210 formulates and at step 609 transmits a new offer to the second party based upon the original offer and the received counteroffer.
- the counteroffer would be authenticated at step 610 and its terms merged into the original offer.
- the basic comparison function is best handled by a knowledge based system rather that a human for accuracy and economic reasons.
- minor variations in contract terms do not require human intervention, especially in a trading partner situation where each subsidiary transaction represents one small interchange in a much larger business relationship and does not warrant excessive human scrutiny and intervention.
- the automatic document authentication process illustrated herein creates legally binding contracts, without the need for human intervention beyond the original offer, and possibly the creation of the acceptance or counteroffer.
- the knowledge based system can act as the agent of the first party and authenticate the contract.
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/792,904 US5191613A (en) | 1990-11-16 | 1991-11-15 | Knowledge based system for document authentication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/615,029 US5163091A (en) | 1990-01-29 | 1990-11-16 | Knowledge based system for document authentication (apparatus) |
US07/792,904 US5191613A (en) | 1990-11-16 | 1991-11-15 | Knowledge based system for document authentication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US07/615,029 Division US5163091A (en) | 1990-01-29 | 1990-11-16 | Knowledge based system for document authentication (apparatus) |
Publications (1)
Publication Number | Publication Date |
---|---|
US5191613A true US5191613A (en) | 1993-03-02 |
Family
ID=27087391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US07/792,904 Expired - Fee Related US5191613A (en) | 1990-11-16 | 1991-11-15 | Knowledge based system for document authentication |
Country Status (1)
Country | Link |
---|---|
US (1) | US5191613A (en) |
Cited By (139)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5337358A (en) * | 1992-11-20 | 1994-08-09 | Pitney Bowes Inc. | Apparatus for recording a transaction including authenticating an identification card |
US5388158A (en) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc. | Secure document and method and apparatus for producing and authenticating same |
US5455828A (en) * | 1992-08-17 | 1995-10-03 | Zisapel; Yehuda | Carrier sensing multiple access/collision detection local area networks |
US5535383A (en) * | 1994-03-17 | 1996-07-09 | Sybase, Inc. | Database system with methods for controlling object interaction by establishing database contracts between objects |
US5546462A (en) * | 1993-04-09 | 1996-08-13 | Washington University | Method and apparatus for fingerprinting and authenticating various magnetic media |
WO1996031965A1 (en) * | 1995-04-07 | 1996-10-10 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5659616A (en) * | 1994-07-19 | 1997-08-19 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
US5689243A (en) * | 1991-03-22 | 1997-11-18 | Hughes Aircraft Company | System and method for tamper detection |
WO1998010361A1 (en) * | 1996-09-04 | 1998-03-12 | Priceline.Com Incorporated | Conditional purchase offer management systems |
US5745678A (en) * | 1994-12-13 | 1998-04-28 | International Business Machines Corporation | Method and system for the secured distribution of multimedia titles |
US5748738A (en) * | 1995-01-17 | 1998-05-05 | Document Authentication Systems, Inc. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US5754657A (en) * | 1995-08-31 | 1998-05-19 | Trimble Navigation Limited | Authentication of a message source |
US5764770A (en) * | 1995-11-07 | 1998-06-09 | Trimble Navigation Limited | Image authentication patterning |
US5793302A (en) * | 1992-11-17 | 1998-08-11 | Stambler; Leon | Method for securing information relevant to a transaction |
US5799082A (en) * | 1995-11-07 | 1998-08-25 | Trimble Navigation Limited | Secure authentication of images |
US5825906A (en) * | 1994-11-30 | 1998-10-20 | Nippondenso Co., Ltd. | Signature recognition system |
US5848184A (en) * | 1993-03-15 | 1998-12-08 | Unisys Corporation | Document page analyzer and method |
US5862223A (en) * | 1996-07-24 | 1999-01-19 | Walker Asset Management Limited Partnership | Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce |
US5864622A (en) * | 1992-11-20 | 1999-01-26 | Pitney Bowes Inc. | Secure identification card and method and apparatus for producing and authenticating same |
US5897646A (en) * | 1994-11-08 | 1999-04-27 | Canon Kabushiki Kaisha | System and method for language information processing for providing knowledge of language requested by the user |
US5920628A (en) * | 1997-01-09 | 1999-07-06 | Washington University | Method and apparatus for fingerprinting and authenticating various magnetic media |
US5928364A (en) * | 1995-11-30 | 1999-07-27 | Casio Computer Co., Ltd. | Secret data storage device, secret data reading method, and control program storing medium |
US5932119A (en) * | 1996-01-05 | 1999-08-03 | Lazare Kaplan International, Inc. | Laser marking system |
AU710463B2 (en) * | 1996-02-16 | 1999-09-23 | Corning Incorporated | A symmetric, dispersion-manager fiber optic cable and system |
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
WO1999052026A2 (en) * | 1998-03-31 | 1999-10-14 | Open Market, Inc. | Electronic commerce system |
EP0956673A1 (en) * | 1996-12-20 | 1999-11-17 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US6021491A (en) * | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives |
US6035406A (en) * | 1997-04-02 | 2000-03-07 | Quintet, Inc. | Plurality-factor security system |
US6041308A (en) * | 1996-09-04 | 2000-03-21 | Priceline.Com Incorporated | System and method for motivating submission of conditional purchase offers |
US6085176A (en) * | 1995-04-26 | 2000-07-04 | Mercexchange, Llc | Method and apparatus for using search agents to search plurality of markets for items |
US6098054A (en) * | 1997-11-13 | 2000-08-01 | Hewlett-Packard Company | Method of securing software configuration parameters with digital signatures |
US6108639A (en) * | 1996-09-04 | 2000-08-22 | Priceline.Com Incorporated | Conditional purchase offer (CPO) management system for collectibles |
US6111953A (en) * | 1997-05-21 | 2000-08-29 | Walker Digital, Llc | Method and apparatus for authenticating a document |
US6134534A (en) * | 1996-09-04 | 2000-10-17 | Priceline.Com Incorporated | Conditional purchase offer management system for cruises |
US6236972B1 (en) | 1998-12-02 | 2001-05-22 | Gary Shkedy | Method and apparatus for facilitating transactions on a commercial network system |
US6237096B1 (en) | 1995-01-17 | 2001-05-22 | Eoriginal Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US6240396B1 (en) | 1996-09-04 | 2001-05-29 | Priceline.Com Incorporated | Conditional purchase offer management system for event tickets |
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US6250549B1 (en) | 1998-06-17 | 2001-06-26 | Defabio, Jr. Daniel J. | Method for authenticating signatures and memorabilia kit employing same |
US20010007981A1 (en) * | 1995-11-07 | 2001-07-12 | Woolston Thomas G. | Facilitating electronic commerce through a two-tiered electronic transactional system |
US6269445B1 (en) * | 1995-08-04 | 2001-07-31 | Hitachi, Ltd. | Electronic shopping method, electronic shopping system and document authenticating method relating thereto |
US6282362B1 (en) | 1995-11-07 | 2001-08-28 | Trimble Navigation Limited | Geographical position/image digital recording and display system |
US20010032097A1 (en) * | 2000-04-28 | 2001-10-18 | Levey Jonah S. | Method and system for collecting and presenting information relating to compensations |
US6323894B1 (en) | 1993-03-12 | 2001-11-27 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US6332129B1 (en) | 1996-09-04 | 2001-12-18 | Priceline.Com Incorporated | Method and system for utilizing a psychographic questionnaire in a buyer-driven commerce system |
US6339830B1 (en) * | 1997-06-13 | 2002-01-15 | Alcatel Internetworking, Inc. | Deterministic user authentication service for communication network |
US6345090B1 (en) | 1996-09-04 | 2002-02-05 | Priceline.Com Incorporated | Conditional purchase offer management system for telephone calls |
US20020023208A1 (en) * | 2000-08-08 | 2002-02-21 | Jancula Jeffrey John | Internet third-party authentication using electronic tickets |
US6351816B1 (en) * | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US20020029337A1 (en) * | 1994-07-19 | 2002-03-07 | Certco, Llc. | Method for securely using digital signatures in a commercial cryptographic system |
US6356878B1 (en) | 1996-09-04 | 2002-03-12 | Priceline.Com Incorporated | Conditional purchase offer buyer agency system |
WO2002035764A2 (en) * | 2000-10-24 | 2002-05-02 | It Security Solutions Llc | Process and apparatus for improving the security of digital signatures |
US6393566B1 (en) | 1995-07-28 | 2002-05-21 | National Institute Of Standards And Technology | Time-stamp service for the national information network |
US6396523B1 (en) | 1999-07-29 | 2002-05-28 | Interlink Electronics, Inc. | Home entertainment device remote control |
US20020066784A1 (en) * | 2000-12-05 | 2002-06-06 | Interlink Electronics, Inc. | Method and system for performing a purchase transaction using a home entertainment device and a signature capturing sensor |
US6418415B1 (en) * | 1996-09-04 | 2002-07-09 | Priceline.Com Incorporated | System and method for aggregating multiple buyers utilizing conditional purchase offers (CPOS) |
US20020120545A1 (en) * | 1994-01-27 | 2002-08-29 | Ronald A. Katz | Commercial product routing system with video vending capability |
US20020129285A1 (en) * | 2001-03-08 | 2002-09-12 | Masateru Kuwata | Biometric authenticated VLAN |
US6484153B1 (en) | 1996-09-04 | 2002-11-19 | Priceline.Com Incorporated | System and method for managing third-party input to a conditional purchase offer (CPO) |
US6510418B1 (en) | 1996-09-04 | 2003-01-21 | Priceline.Com Incorporated | Method and apparatus for detecting and deterring the submission of similar offers in a commerce system |
US6513014B1 (en) | 1996-07-24 | 2003-01-28 | Walker Digital, Llc | Method and apparatus for administering a survey via a television transmission network |
US20030028494A1 (en) * | 2001-08-06 | 2003-02-06 | King Shawn L. | Electronic document management system and method |
US6522727B1 (en) | 1995-03-08 | 2003-02-18 | Comverse, Inc. | System for archiving voice mail messages |
US6553346B1 (en) * | 1996-09-04 | 2003-04-22 | Priceline.Com Incorporated | Conditional purchase offer (CPO) management system for packages |
US20030078862A1 (en) * | 1998-04-30 | 2003-04-24 | Staas & Halsey Llp | Witness system |
US20030080181A1 (en) * | 2001-10-12 | 2003-05-01 | Takahiro Mizuguchi | Security tag using security system and office instrument |
US20030084001A1 (en) * | 2001-10-31 | 2003-05-01 | Netbuck Payment Service Co., Ltd. | System and method for managing and securing transaction information via a third party |
US6560355B2 (en) * | 1997-10-31 | 2003-05-06 | Cummins-Allison Corp. | Currency evaluation and recording system |
US20030120582A1 (en) * | 2001-12-21 | 2003-06-26 | Oncall Solutions, Inc. | Call schedule auctioning method and apparatus |
US6598026B1 (en) | 1999-01-25 | 2003-07-22 | Nextag.Com, Inc. | Methods and apparatus for brokering transactions |
US6629150B1 (en) * | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
US20030185356A1 (en) * | 1993-03-12 | 2003-10-02 | Telebuyer, Llc | Commercial product telephonic routing system with mobile wireless and video vending capability |
US6640007B1 (en) * | 1998-12-07 | 2003-10-28 | Hitachi, Ltd. | Electronic writing implement and method of electronic writing |
US20040025030A1 (en) * | 2000-05-25 | 2004-02-05 | Corbett-Clark Timothy Alexander | Method and system for collection and verification of data from plural sites |
US20040093493A1 (en) * | 1995-01-17 | 2004-05-13 | Bisbee Stephen F. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US20040109547A1 (en) * | 1993-03-12 | 2004-06-10 | Katz Ronald A. | Commercial product routing system with video vending capability |
US6753186B2 (en) | 2001-03-16 | 2004-06-22 | Ewatertek Inc. | Water quality monitoring and transmission system and method |
US20040133512A1 (en) * | 1995-04-26 | 2004-07-08 | Mercexchange, Llc, A Virginia Corporation | Consignment nodes |
US6765557B1 (en) | 2000-04-10 | 2004-07-20 | Interlink Electronics, Inc. | Remote control having touch pad to screen mapping |
US20040156536A1 (en) * | 2003-02-11 | 2004-08-12 | Zank Anthony E. | Wireless signature management system |
US20040177090A1 (en) * | 2003-02-27 | 2004-09-09 | Timothy Corbett-Clark | Database system |
US20040181756A1 (en) * | 2000-06-06 | 2004-09-16 | Berringer Ryan R. | Creating and verifying electronic documents |
US20040222283A1 (en) * | 2003-05-05 | 2004-11-11 | International Business Machines Corporation | Point-of-sale bill authentication |
US20040225567A1 (en) * | 2003-05-06 | 2004-11-11 | International Business Machines Corporation | Point-of-sale electronic receipt generation |
US6839842B1 (en) * | 1996-12-27 | 2005-01-04 | Intel Corporation | Method and apparatus for authenticating information |
US20050004672A1 (en) * | 1995-10-16 | 2005-01-06 | John Pafford | Bone grafts |
US20050096996A1 (en) * | 2000-08-22 | 2005-05-05 | Iclosings.Com, Inc. | Interface for conducting the closing of a real estate sale over a computerized network |
US6898579B1 (en) * | 2000-04-06 | 2005-05-24 | Xerox Corporation | System, method and article of manufacture for contract term certification utilizing a network |
US20050182684A1 (en) * | 2004-02-12 | 2005-08-18 | International Business Machines Corporation | Method and system for economical e-commerce shopping token for validation of online transactions |
US20050182956A1 (en) * | 1995-02-13 | 2005-08-18 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US6952686B1 (en) * | 2000-09-25 | 2005-10-04 | Kabushiki Kaisha Toshiba | Electronic contract safekeeping method, electronic contract verifying method, contractor server, contract safekeeping server, electronic contract safekeeping system, and memory medium |
US6993503B1 (en) | 2000-01-28 | 2006-01-31 | Priceline.Com Incorporated | System and method for allocating a conditional purchase offer for a travel related services reservation to one of a plurality of entities in a buyer driven electronic commerce system |
US7024562B1 (en) | 2000-06-29 | 2006-04-04 | Optisec Technologies Ltd. | Method for carrying out secure digital signature and a system therefor |
US7080041B2 (en) | 2000-05-24 | 2006-07-18 | Esecuredocs, Inc. | System and method for production and authentication of original documents |
US7085735B1 (en) | 2000-02-23 | 2006-08-01 | Iclosings.Com, Inc. | System and method for conducting the closing of a real estate sale over a computerized network |
US7089420B1 (en) | 2000-05-24 | 2006-08-08 | Tracer Detection Technology Corp. | Authentication method and system |
US7103568B1 (en) | 1995-08-08 | 2006-09-05 | Eugene August Fusz | Online product exchange system |
US20060209178A1 (en) * | 1993-03-12 | 2006-09-21 | Telebuyer, Llc | Videophone system for scrutiny monitoring with computer control |
US20060218049A1 (en) * | 1996-09-04 | 2006-09-28 | Walker Jay S | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
WO2006110803A2 (en) * | 2005-04-12 | 2006-10-19 | Charles Martin Hymes | Wireless communications with proximal targets identified visually, aurally, or positionally |
US7133835B1 (en) | 1995-08-08 | 2006-11-07 | Cxn, Inc. | Online exchange market system with a buyer auction and a seller auction |
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US7167844B1 (en) | 1999-12-22 | 2007-01-23 | Accenture Llp | Electronic menu document creator in a virtual financial environment |
US20070083400A1 (en) * | 2005-09-29 | 2007-04-12 | Katz Jeffrey B | Reservation-based preauthorization payment system |
US20070112633A1 (en) * | 1997-05-05 | 2007-05-17 | Walker Jay S | Method and apparatus for facilitating the sale of subscriptions to periodicals |
US20070118469A1 (en) * | 1994-11-21 | 2007-05-24 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20070150354A1 (en) * | 1997-07-08 | 2007-06-28 | Walker Jay S | Method and apparatus for conducting a transaction based on brand indifference |
US20070156529A1 (en) * | 1996-09-04 | 2007-07-05 | Walker Jay S | Method and apparatus for conducting a transaction based on brand indifference |
US20070208625A1 (en) * | 1997-07-08 | 2007-09-06 | Walker Jay S | Retail system for selling products based on a flexible product description |
US20080010099A1 (en) * | 1996-09-04 | 2008-01-10 | Priceline.Com Incorporated | Method and apparatus for facilitating a transaction between a buyer and one seller |
US20080097777A1 (en) * | 2006-10-23 | 2008-04-24 | Ctm Software Corporation | Electronic document execution |
US7386727B1 (en) | 1998-10-24 | 2008-06-10 | Encorus Holdings Limited | Method for digital signing of a message |
US20080141033A1 (en) * | 1995-02-13 | 2008-06-12 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20090034730A1 (en) * | 1997-10-28 | 2009-02-05 | Encorus Holdings Limited | Process for digital signing of a message |
US20090080029A1 (en) * | 2007-09-26 | 2009-03-26 | Ringcentral, Inc. | User interfaces and methods to provision electronic facsimiles |
US20090086278A1 (en) * | 2007-09-27 | 2009-04-02 | Ringcentral, Inc. | Electronic facsimile delivery systems and methods |
US7516089B1 (en) | 1996-09-04 | 2009-04-07 | Pricline.Com Incorporated | System and method for allocating business to one of a plurality of sellers in a buyer driven electronic commerce system |
US7610233B1 (en) | 1999-12-22 | 2009-10-27 | Accenture, Llp | System, method and article of manufacture for initiation of bidding in a virtual trade financial environment |
US20100030759A1 (en) * | 1994-11-21 | 2010-02-04 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20100057503A1 (en) * | 2005-09-29 | 2010-03-04 | The Magellan Network, Llc | Secure system and method to pay for a service provided at a reservation |
US20100128291A1 (en) * | 2008-11-25 | 2010-05-27 | Vlad Vendrow | Authenticated Facsimile Transmission From Mobile Devices |
US7827057B1 (en) | 1998-10-05 | 2010-11-02 | Walker Digital, Llc | Method and apparatus for providing cross-benefits based on a customer activity |
US7848940B1 (en) | 1999-11-15 | 2010-12-07 | Priceline.Com Incorporated | Method, system and apparatus to facilitate conditional purchase orders with bounce back functionality |
US7917436B2 (en) | 1995-07-07 | 2011-03-29 | At&T Intellectual Property I, L.P. | Internet billing method |
US20110099082A1 (en) * | 1997-07-08 | 2011-04-28 | Walker Digital, Llc | Purchasing, redemption and settlement systems and methods wherein a buyer takes possession at a retailer of a product purchased using a communication network |
US20110289549A1 (en) * | 2010-05-24 | 2011-11-24 | Datuit, Llc | Method and system for a document-based knowledge system |
US8108232B1 (en) * | 2005-05-26 | 2012-01-31 | Sprint Communications Company L.P. | System and method for project contract management |
US20120086971A1 (en) * | 2009-12-11 | 2012-04-12 | Eoriginal, Inc. | System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US8702977B2 (en) | 2010-05-20 | 2014-04-22 | Piramal Enterprises Limited | Water distribution system |
US8799100B2 (en) | 1997-07-08 | 2014-08-05 | Groupon, Inc. | Retail system for selling products based on a flexible product description |
US20160004670A1 (en) * | 2009-01-29 | 2016-01-07 | International Business Machines Corporation | Automatic generation of assent indication in a document approval function for collaborative document editing |
US9280696B1 (en) | 2008-04-23 | 2016-03-08 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
US10901696B2 (en) * | 2016-08-19 | 2021-01-26 | International Business Machines Corporation | Validating computer documentation via error detection in a natural language of the computer documentation |
US20220060458A1 (en) * | 2020-08-18 | 2022-02-24 | Fujifilm Business Innovation Corp. | Information processing apparatus and non-transitory computer readable medium |
US11430032B2 (en) | 2002-04-02 | 2022-08-30 | Collaborative Agreements, LLC | Method for facilitating transactions between two or more parties |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4206315A (en) * | 1978-01-04 | 1980-06-03 | International Business Machines Corporation | Digital signature system and apparatus |
US4264782A (en) * | 1979-06-29 | 1981-04-28 | International Business Machines Corporation | Method and apparatus for transaction and identity verification |
US4868877A (en) * | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4935962A (en) * | 1988-05-19 | 1990-06-19 | Ncr Corporation | Method and system for authentication |
-
1991
- 1991-11-15 US US07/792,904 patent/US5191613A/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4206315A (en) * | 1978-01-04 | 1980-06-03 | International Business Machines Corporation | Digital signature system and apparatus |
US4264782A (en) * | 1979-06-29 | 1981-04-28 | International Business Machines Corporation | Method and apparatus for transaction and identity verification |
US4868877A (en) * | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4935962A (en) * | 1988-05-19 | 1990-06-19 | Ncr Corporation | Method and system for authentication |
Cited By (311)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5689243A (en) * | 1991-03-22 | 1997-11-18 | Hughes Aircraft Company | System and method for tamper detection |
US5455828A (en) * | 1992-08-17 | 1995-10-03 | Zisapel; Yehuda | Carrier sensing multiple access/collision detection local area networks |
US5793302A (en) * | 1992-11-17 | 1998-08-11 | Stambler; Leon | Method for securing information relevant to a transaction |
US5974148A (en) * | 1992-11-17 | 1999-10-26 | Stambler; Leon | Method for securing information relevant to a transaction |
US5936541A (en) * | 1992-11-17 | 1999-08-10 | Stambler; Leon | Method for securing information relevant to a transaction |
US5388158A (en) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc. | Secure document and method and apparatus for producing and authenticating same |
US6354494B1 (en) * | 1992-11-20 | 2002-03-12 | Pitney Bowes Inc. | Secure identification card and method and apparatus for producing and authenticating same |
US5337358A (en) * | 1992-11-20 | 1994-08-09 | Pitney Bowes Inc. | Apparatus for recording a transaction including authenticating an identification card |
US5864622A (en) * | 1992-11-20 | 1999-01-26 | Pitney Bowes Inc. | Secure identification card and method and apparatus for producing and authenticating same |
US20030156185A1 (en) * | 1993-03-12 | 2003-08-21 | Katz Ronald A. | Method for buyer-seller on-line commerce |
US6323894B1 (en) | 1993-03-12 | 2001-11-27 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US8315364B2 (en) | 1993-03-12 | 2012-11-20 | Telebuyer, Llc | Commercial product telephonic routing system with mobile wireless and video vending capability |
US7835509B2 (en) | 1993-03-12 | 2010-11-16 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US7839984B2 (en) | 1993-03-12 | 2010-11-23 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US7848496B2 (en) | 1993-03-12 | 2010-12-07 | Telebuyer, Llc | Method for buyer-seller-on-line commerce |
US9053485B2 (en) | 1993-03-12 | 2015-06-09 | Telebuyer, Llc | Security monitoring system with image comparison of monitored location |
US8842151B2 (en) | 1993-03-12 | 2014-09-23 | Telebuyer, Llc | Security monitoring system with flexible monitoring sequence |
US8836749B2 (en) | 1993-03-12 | 2014-09-16 | Telebuyer, Llc | Security monitoring system with combined video and graphics display |
US20040076275A1 (en) * | 1993-03-12 | 2004-04-22 | Katz Ronald A. | Commercial product telephonic routing system with mobile wireless and video vending capability |
US20060209178A1 (en) * | 1993-03-12 | 2006-09-21 | Telebuyer, Llc | Videophone system for scrutiny monitoring with computer control |
US7835508B1 (en) | 1993-03-12 | 2010-11-16 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US20030185356A1 (en) * | 1993-03-12 | 2003-10-02 | Telebuyer, Llc | Commercial product telephonic routing system with mobile wireless and video vending capability |
US20040109547A1 (en) * | 1993-03-12 | 2004-06-10 | Katz Ronald A. | Commercial product routing system with video vending capability |
US20060215029A1 (en) * | 1993-03-12 | 2006-09-28 | Katz Ronald A | Commercial product routing system with video vending capability |
US20030040981A1 (en) * | 1993-03-12 | 2003-02-27 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US20090015652A1 (en) * | 1993-03-12 | 2009-01-15 | Telebuyer, Llc | Videophone system for scrutiny monitoring with computer control |
US8059796B2 (en) | 1993-03-12 | 2011-11-15 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US20020101504A1 (en) * | 1993-03-12 | 2002-08-01 | Katz Ronald A. | Commercial product routing system with video vending capability |
US20020001372A1 (en) * | 1993-03-12 | 2002-01-03 | Ronald A. Katz | Method for buyer-seller-on-line commerce |
US8098272B2 (en) | 1993-03-12 | 2012-01-17 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US8111279B2 (en) | 1993-03-12 | 2012-02-07 | Telebuyer Llc | Commercial product routing system with video vending capability |
US20040109058A1 (en) * | 1993-03-12 | 2004-06-10 | Katz Ronald A. | Commercial product routing system with video vending capability |
US8207998B1 (en) | 1993-03-12 | 2012-06-26 | Telebuyer, Llc | Commercial product routing system with video vending capability |
US20040111752A1 (en) * | 1993-03-12 | 2004-06-10 | Katz Ronald A. | Commercial product routing system with video vending capability |
US5848184A (en) * | 1993-03-15 | 1998-12-08 | Unisys Corporation | Document page analyzer and method |
US5546462A (en) * | 1993-04-09 | 1996-08-13 | Washington University | Method and apparatus for fingerprinting and authenticating various magnetic media |
US5740244A (en) * | 1993-04-09 | 1998-04-14 | Washington University | Method and apparatus for improved fingerprinting and authenticating various magnetic media |
US20060224464A1 (en) * | 1993-06-30 | 2006-10-05 | Walker Jay S | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US20020120545A1 (en) * | 1994-01-27 | 2002-08-29 | Ronald A. Katz | Commercial product routing system with video vending capability |
US5535383A (en) * | 1994-03-17 | 1996-07-09 | Sybase, Inc. | Database system with methods for controlling object interaction by establishing database contracts between objects |
US5751909A (en) * | 1994-03-17 | 1998-05-12 | Sybase, Inc. | Database system with methods for controlling object interaction by establishing database contracts between objects |
US20020029337A1 (en) * | 1994-07-19 | 2002-03-07 | Certco, Llc. | Method for securely using digital signatures in a commercial cryptographic system |
US5659616A (en) * | 1994-07-19 | 1997-08-19 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
US7904722B2 (en) | 1994-07-19 | 2011-03-08 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5897646A (en) * | 1994-11-08 | 1999-04-27 | Canon Kabushiki Kaisha | System and method for language information processing for providing knowledge of language requested by the user |
US20070150304A1 (en) * | 1994-11-21 | 2007-06-28 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20070118468A1 (en) * | 1994-11-21 | 2007-05-24 | David Lawrence | Methods and systems for retrieving data stored in a database |
US8566215B2 (en) * | 1994-11-21 | 2013-10-22 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in a database |
US20070118469A1 (en) * | 1994-11-21 | 2007-05-24 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20070118467A1 (en) * | 1994-11-21 | 2007-05-24 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20100030759A1 (en) * | 1994-11-21 | 2010-02-04 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20070124167A1 (en) * | 1994-11-21 | 2007-05-31 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20070124168A1 (en) * | 1994-11-21 | 2007-05-31 | David Lawrence | Methods and systems for retrieving data stored in a database |
US7555282B2 (en) | 1994-11-21 | 2009-06-30 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in a database |
US20080071669A1 (en) * | 1994-11-21 | 2008-03-20 | David Lawrence | Methods and systems for retrieving data stored in a database |
US20080077522A1 (en) * | 1994-11-21 | 2008-03-27 | David Lawrence | Methods and systems for retrieving data stored in a database |
US8560427B2 (en) | 1994-11-21 | 2013-10-15 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in a database |
US20080243706A1 (en) * | 1994-11-21 | 2008-10-02 | David Lawrence | Methods and systems for retrieving data stored in a database |
US8560426B2 (en) | 1994-11-21 | 2013-10-15 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in database |
US8588729B2 (en) | 1994-11-21 | 2013-11-19 | Bgc Partners, Inc. | Method for retrieving data stored in a database |
US8547199B2 (en) | 1994-11-21 | 2013-10-01 | Bgc Partners, Inc. | System for retrieving data stored in a database |
US8626131B2 (en) | 1994-11-21 | 2014-01-07 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in a database |
US8554661B2 (en) | 1994-11-21 | 2013-10-08 | Bgc Partners, Inc. | Methods and systems for retrieving data stored in a database |
US5825906A (en) * | 1994-11-30 | 1998-10-20 | Nippondenso Co., Ltd. | Signature recognition system |
US5745678A (en) * | 1994-12-13 | 1998-04-28 | International Business Machines Corporation | Method and system for the secured distribution of multimedia titles |
USRE38375E1 (en) * | 1994-12-13 | 2003-12-30 | International Business Machines Corporation | Method and system for the secured distribution of multimedia titles |
US5748738A (en) * | 1995-01-17 | 1998-05-05 | Document Authentication Systems, Inc. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US20040093493A1 (en) * | 1995-01-17 | 2004-05-13 | Bisbee Stephen F. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US7162635B2 (en) * | 1995-01-17 | 2007-01-09 | Eoriginal, Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US6237096B1 (en) | 1995-01-17 | 2001-05-22 | Eoriginal Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US7743248B2 (en) | 1995-01-17 | 2010-06-22 | Eoriginal, Inc. | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components |
US20080141033A1 (en) * | 1995-02-13 | 2008-06-12 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20100325698A1 (en) * | 1995-02-13 | 2010-12-23 | Ginter Karl L | Trusted and Secure Techniques for Item Delivery and Execution |
US20050182956A1 (en) * | 1995-02-13 | 2005-08-18 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20050240771A1 (en) * | 1995-02-13 | 2005-10-27 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20100161963A1 (en) * | 1995-02-13 | 2010-06-24 | Intertrust Technologies Corp. | Trusted and secure techniques for item delivery and execution |
US7587369B2 (en) | 1995-02-13 | 2009-09-08 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20070271463A1 (en) * | 1995-02-13 | 2007-11-22 | Intertrust Technologies Corp. | Trusted and Secure Techniques for Item Delivery and Execution |
US20080022100A1 (en) * | 1995-02-13 | 2008-01-24 | Intertrust Technologies Corp. | Trusted and secure techniques for item delivery and execution |
US20080250241A1 (en) * | 1995-02-13 | 2008-10-09 | Intertrust Technology Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US8443198B2 (en) | 1995-02-13 | 2013-05-14 | Intertrust Technologies Corporation | Trusted and secure techniques for item delivery and execution |
US7392395B2 (en) * | 1995-02-13 | 2008-06-24 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US9195845B2 (en) | 1995-02-13 | 2015-11-24 | Intertrust Technologies Corporation | Trusted and secure techniques for item delivery and execution |
US8528097B2 (en) | 1995-02-13 | 2013-09-03 | Intertrust Technologies Corporation | Trusted and secure techniques for item delivery and execution |
US6522727B1 (en) | 1995-03-08 | 2003-02-18 | Comverse, Inc. | System for archiving voice mail messages |
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
WO1996031965A1 (en) * | 1995-04-07 | 1996-10-10 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US7937312B1 (en) | 1995-04-26 | 2011-05-03 | Ebay Inc. | Facilitating electronic commerce transactions through binding offers |
US20110099090A1 (en) * | 1995-04-26 | 2011-04-28 | Ebay Inc. | Methods and systems for searching for goods and services |
US20110099091A1 (en) * | 1995-04-26 | 2011-04-28 | Ebay Inc. | Methods and systems for searching for goods and services |
US7702540B1 (en) * | 1995-04-26 | 2010-04-20 | Ebay Inc. | Computer-implement method and system for conducting auctions on the internet |
US7613633B1 (en) | 1995-04-26 | 2009-11-03 | Ebay Inc. | Method for facilitating commerce at an internet-based auction |
US7970652B1 (en) | 1995-04-26 | 2011-06-28 | Ebay Inc. | Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system |
US7831477B2 (en) | 1995-04-26 | 2010-11-09 | Ebay Inc. | Method for reposting a good for sale using a consignment node |
US6202051B1 (en) | 1995-04-26 | 2001-03-13 | Merc Exchange Llc | Facilitating internet commerce through internetworked auctions |
US8332279B2 (en) | 1995-04-26 | 2012-12-11 | Ebay Inc. | Methods and systems for searching for goods and services |
US6085176A (en) * | 1995-04-26 | 2000-07-04 | Mercexchange, Llc | Method and apparatus for using search agents to search plurality of markets for items |
US8332278B2 (en) | 1995-04-26 | 2012-12-11 | Ebay Inc. | Method and system for retrieving information regarding an item posted for sale |
US8341028B2 (en) | 1995-04-26 | 2012-12-25 | Ebay Inc. | Methods and systems for searching for goods |
US8352328B2 (en) | 1995-04-26 | 2013-01-08 | Ebay Inc. | Methods and systems for searching for goods in a virtual marketplace |
US8355956B2 (en) | 1995-04-26 | 2013-01-15 | Ebay Inc. | Marketing goods with bar codes |
US8392273B2 (en) | 1995-04-26 | 2013-03-05 | Ebay Inc. | Marketplace payments |
US20040133512A1 (en) * | 1995-04-26 | 2004-07-08 | Mercexchange, Llc, A Virginia Corporation | Consignment nodes |
US6266651B1 (en) | 1995-04-26 | 2001-07-24 | Mercexchange Llc (Va) | Facilitating electronic commerce through two-tiered electronic markets and auctions |
US20050033655A1 (en) * | 1995-04-26 | 2005-02-10 | Mercexchange, Llc, A Virginia Corporation | Consignment nodes |
US7917436B2 (en) | 1995-07-07 | 2011-03-29 | At&T Intellectual Property I, L.P. | Internet billing method |
US8086532B2 (en) | 1995-07-07 | 2011-12-27 | At&T Intellectual Property I, L.P. | Internet billing method |
US20110145143A1 (en) * | 1995-07-07 | 2011-06-16 | At & T Intellectual Property I, L.P. | Internet billing method |
US6393566B1 (en) | 1995-07-28 | 2002-05-21 | National Institute Of Standards And Technology | Time-stamp service for the national information network |
US6269445B1 (en) * | 1995-08-04 | 2001-07-31 | Hitachi, Ltd. | Electronic shopping method, electronic shopping system and document authenticating method relating thereto |
US8024226B2 (en) | 1995-08-08 | 2011-09-20 | Mirim Network Transfer Ltd. L.L.C. | Product exchange system |
US20070078728A1 (en) * | 1995-08-08 | 2007-04-05 | Fusz Eugene A | Product exchange system |
US8332324B2 (en) | 1995-08-08 | 2012-12-11 | Mirim Network Transfer Ltd. L.L.C. | Product exchange system |
US7103568B1 (en) | 1995-08-08 | 2006-09-05 | Eugene August Fusz | Online product exchange system |
US7133835B1 (en) | 1995-08-08 | 2006-11-07 | Cxn, Inc. | Online exchange market system with a buyer auction and a seller auction |
US20070005446A1 (en) * | 1995-08-08 | 2007-01-04 | Fusz Eugene A | Online Product Exchange System with Price-Sorted Matching Products |
US20070233578A1 (en) * | 1995-08-08 | 2007-10-04 | Fusz Eugene A | Online Product Exchange System and Methods |
US7933806B2 (en) | 1995-08-08 | 2011-04-26 | Mirim Network Transfer Ltd. L.L.C. | Online product exchange system with price-sorted matching products |
US5754657A (en) * | 1995-08-31 | 1998-05-19 | Trimble Navigation Limited | Authentication of a message source |
US20050004672A1 (en) * | 1995-10-16 | 2005-01-06 | John Pafford | Bone grafts |
US20010007981A1 (en) * | 1995-11-07 | 2001-07-12 | Woolston Thomas G. | Facilitating electronic commerce through a two-tiered electronic transactional system |
US7647243B2 (en) | 1995-11-07 | 2010-01-12 | Ebay Inc. | Electronic marketplace system and method for creation of a two-tiered pricing scheme |
US6282362B1 (en) | 1995-11-07 | 2001-08-28 | Trimble Navigation Limited | Geographical position/image digital recording and display system |
US5799082A (en) * | 1995-11-07 | 1998-08-25 | Trimble Navigation Limited | Secure authentication of images |
US5764770A (en) * | 1995-11-07 | 1998-06-09 | Trimble Navigation Limited | Image authentication patterning |
US5928364A (en) * | 1995-11-30 | 1999-07-27 | Casio Computer Co., Ltd. | Secret data storage device, secret data reading method, and control program storing medium |
US6211484B1 (en) | 1996-01-05 | 2001-04-03 | Lazare Kaplan International, Inc. | Laser making system and certificate for a gemstone |
EP2216126A2 (en) | 1996-01-05 | 2010-08-11 | Lazare Kaplan International Inc. | Laser marking system for gemstones and method of authenticating marking |
US5932119A (en) * | 1996-01-05 | 1999-08-03 | Lazare Kaplan International, Inc. | Laser marking system |
US6476351B1 (en) | 1996-01-05 | 2002-11-05 | Lazare Kaplan International, Inc. | Laser marking system |
AU710463B2 (en) * | 1996-02-16 | 1999-09-23 | Corning Incorporated | A symmetric, dispersion-manager fiber optic cable and system |
US6351816B1 (en) * | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US5862223A (en) * | 1996-07-24 | 1999-01-19 | Walker Asset Management Limited Partnership | Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce |
US20060224509A1 (en) * | 1996-07-24 | 2006-10-05 | Walker Jay S | Method and apparatus for a cryptographically-assisted commerical network system designed to facilitate and support expert-based commerce |
US8626667B2 (en) | 1996-07-24 | 2014-01-07 | Community United Ip, Llc | Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce |
US6513014B1 (en) | 1996-07-24 | 2003-01-28 | Walker Digital, Llc | Method and apparatus for administering a survey via a television transmission network |
US20060235793A1 (en) * | 1996-07-24 | 2006-10-19 | Walker Jay S | Method and apparatus for a cryptographically-assisted commerical network system designed to facilitate and support expert-based commerce |
US8326765B2 (en) | 1996-07-24 | 2012-12-04 | Community United Ip, Llc | Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce |
US7523045B1 (en) | 1996-07-24 | 2009-04-21 | Walker Digital, Llc | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate and support expert-based commerce |
US6345090B1 (en) | 1996-09-04 | 2002-02-05 | Priceline.Com Incorporated | Conditional purchase offer management system for telephone calls |
US8732066B2 (en) | 1996-09-04 | 2014-05-20 | Priceline.Com Incorporated | Method and apparatus for facilitating a transaction between a buyer and one seller |
US6085169A (en) * | 1996-09-04 | 2000-07-04 | Priceline.Com Incorporated | Conditional purchase offer management system |
US20060218049A1 (en) * | 1996-09-04 | 2006-09-28 | Walker Jay S | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US6418415B1 (en) * | 1996-09-04 | 2002-07-09 | Priceline.Com Incorporated | System and method for aggregating multiple buyers utilizing conditional purchase offers (CPOS) |
US7620619B1 (en) | 1996-09-04 | 2009-11-17 | Priceline.Com Incorporated | Conditional purchase offer management system |
US8234164B2 (en) | 1996-09-04 | 2012-07-31 | Walker Digital, Llc | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US6466919B1 (en) | 1996-09-04 | 2002-10-15 | Priceline.Com Incorporated | System and method for aggregating multiple buyers utilizing conditional purchase offers (CPOS) |
US6108639A (en) * | 1996-09-04 | 2000-08-22 | Priceline.Com Incorporated | Conditional purchase offer (CPO) management system for collectibles |
US8135650B2 (en) | 1996-09-04 | 2012-03-13 | Priceline.Com, Incorporated | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
WO1998010361A1 (en) * | 1996-09-04 | 1998-03-12 | Priceline.Com Incorporated | Conditional purchase offer management systems |
US7516089B1 (en) | 1996-09-04 | 2009-04-07 | Pricline.Com Incorporated | System and method for allocating business to one of a plurality of sellers in a buyer driven electronic commerce system |
US6134534A (en) * | 1996-09-04 | 2000-10-17 | Priceline.Com Incorporated | Conditional purchase offer management system for cruises |
US8095450B2 (en) | 1996-09-04 | 2012-01-10 | Priceline.Com Incorporated | Method and apparatus for facilitating a transaction between a buyer and one seller |
US7664672B1 (en) | 1996-09-04 | 2010-02-16 | Priceline.Com Incorporated | Conditional purchase offer management system |
US20100094669A1 (en) * | 1996-09-04 | 2010-04-15 | Walker Jay S | Conditional Purchase Offer Management System |
US8086653B1 (en) | 1996-09-04 | 2011-12-27 | Priceline.Com Incorporated | Conditional purchase offer management system |
US5794207A (en) * | 1996-09-04 | 1998-08-11 | Walker Asset Management Limited Partnership | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
US8082180B2 (en) | 1996-09-04 | 2011-12-20 | Priceline.Com Incorporated | Conditional purchase offer management system |
US8082221B2 (en) | 1996-09-04 | 2011-12-20 | Priceline.Com Incorporated | Conditional purchase offer management system |
US8543451B2 (en) | 1996-09-04 | 2013-09-24 | Walker Digital, Llc | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US7472074B1 (en) | 1996-09-04 | 2008-12-30 | Priceline.Com Incorporated | Method and apparatus for a commercial network system designed to facilitate buyer-driven conditional purchase offers |
US20070156529A1 (en) * | 1996-09-04 | 2007-07-05 | Walker Jay S | Method and apparatus for conducting a transaction based on brand indifference |
US6240396B1 (en) | 1996-09-04 | 2001-05-29 | Priceline.Com Incorporated | Conditional purchase offer management system for event tickets |
US6484153B1 (en) | 1996-09-04 | 2002-11-19 | Priceline.Com Incorporated | System and method for managing third-party input to a conditional purchase offer (CPO) |
US8548871B2 (en) | 1996-09-04 | 2013-10-01 | Priceline.Com Incorporated | System and method for allocating business to one of a plurality of sellers in a buyer driven electronic commerce system |
US6510418B1 (en) | 1996-09-04 | 2003-01-21 | Priceline.Com Incorporated | Method and apparatus for detecting and deterring the submission of similar offers in a commerce system |
US8700481B2 (en) | 1996-09-04 | 2014-04-15 | Priceline.Com Incorporated | Conditional purchase offer management system |
US20110054988A1 (en) * | 1996-09-04 | 2011-03-03 | Walker Digital, Llc | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US20080010099A1 (en) * | 1996-09-04 | 2008-01-10 | Priceline.Com Incorporated | Method and apparatus for facilitating a transaction between a buyer and one seller |
US6332129B1 (en) | 1996-09-04 | 2001-12-18 | Priceline.Com Incorporated | Method and system for utilizing a psychographic questionnaire in a buyer-driven commerce system |
US20090271317A1 (en) * | 1996-09-04 | 2009-10-29 | Walker Jay S | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
US6553346B1 (en) * | 1996-09-04 | 2003-04-22 | Priceline.Com Incorporated | Conditional purchase offer (CPO) management system for packages |
US8712920B2 (en) | 1996-09-04 | 2014-04-29 | Priceline.Com Incorporated | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
US7386508B1 (en) | 1996-09-04 | 2008-06-10 | Priceline.Com, Incorporated | Method and apparatus for facilitating a transaction between a buyer and one seller |
US6356878B1 (en) | 1996-09-04 | 2002-03-12 | Priceline.Com Incorporated | Conditional purchase offer buyer agency system |
US7831470B1 (en) | 1996-09-04 | 2010-11-09 | Walker Digital, Llc | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US6041308A (en) * | 1996-09-04 | 2000-03-21 | Priceline.Com Incorporated | System and method for motivating submission of conditional purchase offers |
US7827056B2 (en) | 1996-09-04 | 2010-11-02 | Walker Digital, Llc | Method and apparatus for facilitating electronic commerce through providing cross-benefits during a transaction |
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
US6021491A (en) * | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives |
US6021202A (en) * | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
EP0956673A4 (en) * | 1996-12-20 | 2005-04-06 | Financial Services Technology | Method and system for processing electronic documents |
US6609200B2 (en) | 1996-12-20 | 2003-08-19 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US6209095B1 (en) | 1996-12-20 | 2001-03-27 | Financial Services Technology Consortium | Method and system for processing electronic documents |
EP0956673A1 (en) * | 1996-12-20 | 1999-11-17 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US6839842B1 (en) * | 1996-12-27 | 2005-01-04 | Intel Corporation | Method and apparatus for authenticating information |
US5920628A (en) * | 1997-01-09 | 1999-07-06 | Washington University | Method and apparatus for fingerprinting and authenticating various magnetic media |
US6035406A (en) * | 1997-04-02 | 2000-03-07 | Quintet, Inc. | Plurality-factor security system |
US20070112633A1 (en) * | 1997-05-05 | 2007-05-17 | Walker Jay S | Method and apparatus for facilitating the sale of subscriptions to periodicals |
US8015059B2 (en) | 1997-05-05 | 2011-09-06 | Walker Digital, Llc | Method and apparatus for facilitating the sale of subscriptions to periodicals |
US6111953A (en) * | 1997-05-21 | 2000-08-29 | Walker Digital, Llc | Method and apparatus for authenticating a document |
US8424055B2 (en) | 1997-06-13 | 2013-04-16 | Alcatel Lucent | Deterministic user authentication service for communication network |
US6339830B1 (en) * | 1997-06-13 | 2002-01-15 | Alcatel Internetworking, Inc. | Deterministic user authentication service for communication network |
US20050278541A1 (en) * | 1997-06-13 | 2005-12-15 | See Michael E | Deterministic user authentication service for communication network |
US6874090B2 (en) | 1997-06-13 | 2005-03-29 | Alcatel | Deterministic user authentication service for communication network |
US9684916B2 (en) | 1997-07-08 | 2017-06-20 | Groupon, Inc. | Retail system for selling products based on a flexible product description |
US20110099082A1 (en) * | 1997-07-08 | 2011-04-28 | Walker Digital, Llc | Purchasing, redemption and settlement systems and methods wherein a buyer takes possession at a retailer of a product purchased using a communication network |
US8150735B2 (en) | 1997-07-08 | 2012-04-03 | Groupon, Inc. | Retail system for selling products based on a flexible product description |
US8799100B2 (en) | 1997-07-08 | 2014-08-05 | Groupon, Inc. | Retail system for selling products based on a flexible product description |
US20070208625A1 (en) * | 1997-07-08 | 2007-09-06 | Walker Jay S | Retail system for selling products based on a flexible product description |
US20070150354A1 (en) * | 1997-07-08 | 2007-06-28 | Walker Jay S | Method and apparatus for conducting a transaction based on brand indifference |
US9754302B2 (en) | 1997-07-08 | 2017-09-05 | Groupon, Inc. | Retail system for selling products based on a flexible product description |
US7774609B2 (en) | 1997-10-28 | 2010-08-10 | First Data Mobile Holdings Limited | Process for digital signing of a message |
US20090034730A1 (en) * | 1997-10-28 | 2009-02-05 | Encorus Holdings Limited | Process for digital signing of a message |
US6560355B2 (en) * | 1997-10-31 | 2003-05-06 | Cummins-Allison Corp. | Currency evaluation and recording system |
US6098054A (en) * | 1997-11-13 | 2000-08-01 | Hewlett-Packard Company | Method of securing software configuration parameters with digital signatures |
WO1999052026A3 (en) * | 1998-03-31 | 2000-05-04 | Open Market Inc | Electronic commerce system |
WO1999052026A2 (en) * | 1998-03-31 | 1999-10-14 | Open Market, Inc. | Electronic commerce system |
US20030078862A1 (en) * | 1998-04-30 | 2003-04-24 | Staas & Halsey Llp | Witness system |
US7418397B2 (en) * | 1998-04-30 | 2008-08-26 | Fujitsu Limited | Witness system |
US20090063313A1 (en) * | 1998-04-30 | 2009-03-05 | Fujitsu Limited | Witness system |
US6250549B1 (en) | 1998-06-17 | 2001-06-26 | Defabio, Jr. Daniel J. | Method for authenticating signatures and memorabilia kit employing same |
US20010010330A1 (en) * | 1998-06-17 | 2001-08-02 | Defabio Daniel J. | Method for authenticating signatures and memorabilia kit employing same |
US9697553B2 (en) | 1998-10-05 | 2017-07-04 | Paypal, Inc. | Method and apparatus for providing cross-benefits based on a customer activity |
US7827057B1 (en) | 1998-10-05 | 2010-11-02 | Walker Digital, Llc | Method and apparatus for providing cross-benefits based on a customer activity |
US8700456B2 (en) | 1998-10-05 | 2014-04-15 | Inventor Holdings, Llc | Method and apparatus for providing cross-benefits based on a customer activity |
US7386727B1 (en) | 1998-10-24 | 2008-06-10 | Encorus Holdings Limited | Method for digital signing of a message |
US6260024B1 (en) | 1998-12-02 | 2001-07-10 | Gary Shkedy | Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system |
US6236972B1 (en) | 1998-12-02 | 2001-05-22 | Gary Shkedy | Method and apparatus for facilitating transactions on a commercial network system |
US6640007B1 (en) * | 1998-12-07 | 2003-10-28 | Hitachi, Ltd. | Electronic writing implement and method of electronic writing |
US6598026B1 (en) | 1999-01-25 | 2003-07-22 | Nextag.Com, Inc. | Methods and apparatus for brokering transactions |
US6629150B1 (en) * | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
US6396523B1 (en) | 1999-07-29 | 2002-05-28 | Interlink Electronics, Inc. | Home entertainment device remote control |
US8095401B1 (en) | 1999-11-15 | 2012-01-10 | Priceline.Com Incorporated | Bounce back method, system and apparatus |
US7848940B1 (en) | 1999-11-15 | 2010-12-07 | Priceline.Com Incorporated | Method, system and apparatus to facilitate conditional purchase orders with bounce back functionality |
US8306834B1 (en) | 1999-11-15 | 2012-11-06 | Priceline.Com, Incorporated | Bounce back method, system and apparatus |
US7610233B1 (en) | 1999-12-22 | 2009-10-27 | Accenture, Llp | System, method and article of manufacture for initiation of bidding in a virtual trade financial environment |
US7167844B1 (en) | 1999-12-22 | 2007-01-23 | Accenture Llp | Electronic menu document creator in a virtual financial environment |
US6993503B1 (en) | 2000-01-28 | 2006-01-31 | Priceline.Com Incorporated | System and method for allocating a conditional purchase offer for a travel related services reservation to one of a plurality of entities in a buyer driven electronic commerce system |
US7085735B1 (en) | 2000-02-23 | 2006-08-01 | Iclosings.Com, Inc. | System and method for conducting the closing of a real estate sale over a computerized network |
US6898579B1 (en) * | 2000-04-06 | 2005-05-24 | Xerox Corporation | System, method and article of manufacture for contract term certification utilizing a network |
US6765557B1 (en) | 2000-04-10 | 2004-07-20 | Interlink Electronics, Inc. | Remote control having touch pad to screen mapping |
US20010032097A1 (en) * | 2000-04-28 | 2001-10-18 | Levey Jonah S. | Method and system for collecting and presenting information relating to compensations |
US7089420B1 (en) | 2000-05-24 | 2006-08-08 | Tracer Detection Technology Corp. | Authentication method and system |
US9363083B1 (en) | 2000-05-24 | 2016-06-07 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US7152047B1 (en) | 2000-05-24 | 2006-12-19 | Esecure.Biz, Inc. | System and method for production and authentication of original documents |
US9811671B1 (en) | 2000-05-24 | 2017-11-07 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US8270603B1 (en) | 2000-05-24 | 2012-09-18 | Tracer Detection Technology Corp. | Authentication method and system |
US7080041B2 (en) | 2000-05-24 | 2006-07-18 | Esecuredocs, Inc. | System and method for production and authentication of original documents |
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US20040025030A1 (en) * | 2000-05-25 | 2004-02-05 | Corbett-Clark Timothy Alexander | Method and system for collection and verification of data from plural sites |
US20040181756A1 (en) * | 2000-06-06 | 2004-09-16 | Berringer Ryan R. | Creating and verifying electronic documents |
US20060179320A1 (en) * | 2000-06-06 | 2006-08-10 | Berringer Ryan R | Creating and verifying electronic documents |
US7069443B2 (en) | 2000-06-06 | 2006-06-27 | Ingeo Systems, Inc. | Creating and verifying electronic documents |
US8402276B2 (en) | 2000-06-06 | 2013-03-19 | Ingeo Systems, Inc. | Creating and verifying electronic documents |
US7024562B1 (en) | 2000-06-29 | 2006-04-04 | Optisec Technologies Ltd. | Method for carrying out secure digital signature and a system therefor |
US7266684B2 (en) * | 2000-08-08 | 2007-09-04 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
US20020023208A1 (en) * | 2000-08-08 | 2002-02-21 | Jancula Jeffrey John | Internet third-party authentication using electronic tickets |
US20070266238A1 (en) * | 2000-08-08 | 2007-11-15 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
US20050096996A1 (en) * | 2000-08-22 | 2005-05-05 | Iclosings.Com, Inc. | Interface for conducting the closing of a real estate sale over a computerized network |
US7596511B2 (en) * | 2000-08-22 | 2009-09-29 | Iclosings.Com | Closing system for closing real-estate transactions between a plurality of parties |
US6952686B1 (en) * | 2000-09-25 | 2005-10-04 | Kabushiki Kaisha Toshiba | Electronic contract safekeeping method, electronic contract verifying method, contractor server, contract safekeeping server, electronic contract safekeeping system, and memory medium |
WO2002035764A2 (en) * | 2000-10-24 | 2002-05-02 | It Security Solutions Llc | Process and apparatus for improving the security of digital signatures |
US20020053028A1 (en) * | 2000-10-24 | 2002-05-02 | Davis Steven B. | Process and apparatus for improving the security of digital signatures and public key infrastructures for real-world applications |
WO2002035764A3 (en) * | 2000-10-24 | 2003-08-21 | It Security Solutions Llc | Process and apparatus for improving the security of digital signatures |
US20020066784A1 (en) * | 2000-12-05 | 2002-06-06 | Interlink Electronics, Inc. | Method and system for performing a purchase transaction using a home entertainment device and a signature capturing sensor |
US6820804B2 (en) | 2000-12-05 | 2004-11-23 | Interlink Electronics, Inc. | Method and system for performing a purchase transaction using a remote control and a television |
US20020129285A1 (en) * | 2001-03-08 | 2002-09-12 | Masateru Kuwata | Biometric authenticated VLAN |
US6753186B2 (en) | 2001-03-16 | 2004-06-22 | Ewatertek Inc. | Water quality monitoring and transmission system and method |
US20030028494A1 (en) * | 2001-08-06 | 2003-02-06 | King Shawn L. | Electronic document management system and method |
US20030080181A1 (en) * | 2001-10-12 | 2003-05-01 | Takahiro Mizuguchi | Security tag using security system and office instrument |
US7032813B2 (en) * | 2001-10-12 | 2006-04-25 | Ricoh Company, Ltd. | Security tag using security system and office instrument |
US20030084001A1 (en) * | 2001-10-31 | 2003-05-01 | Netbuck Payment Service Co., Ltd. | System and method for managing and securing transaction information via a third party |
US20030120582A1 (en) * | 2001-12-21 | 2003-06-26 | Oncall Solutions, Inc. | Call schedule auctioning method and apparatus |
US11430032B2 (en) | 2002-04-02 | 2022-08-30 | Collaborative Agreements, LLC | Method for facilitating transactions between two or more parties |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US8886946B1 (en) | 2002-09-04 | 2014-11-11 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US7123143B2 (en) | 2003-02-11 | 2006-10-17 | Topaz Systems, Inc. | Wireless signature management system |
US20040156536A1 (en) * | 2003-02-11 | 2004-08-12 | Zank Anthony E. | Wireless signature management system |
US20040177090A1 (en) * | 2003-02-27 | 2004-09-09 | Timothy Corbett-Clark | Database system |
US20040222283A1 (en) * | 2003-05-05 | 2004-11-11 | International Business Machines Corporation | Point-of-sale bill authentication |
US6883706B2 (en) | 2003-05-05 | 2005-04-26 | International Business Machines Corporation | Point-of-sale bill authentication |
US20070094088A1 (en) * | 2003-05-06 | 2007-04-26 | International Business Machines Corporation | System and method of directly providing electronic receipts |
US7797192B2 (en) | 2003-05-06 | 2010-09-14 | International Business Machines Corporation | Point-of-sale electronic receipt generation |
US20040225567A1 (en) * | 2003-05-06 | 2004-11-11 | International Business Machines Corporation | Point-of-sale electronic receipt generation |
US20050182684A1 (en) * | 2004-02-12 | 2005-08-18 | International Business Machines Corporation | Method and system for economical e-commerce shopping token for validation of online transactions |
WO2006110803A2 (en) * | 2005-04-12 | 2006-10-19 | Charles Martin Hymes | Wireless communications with proximal targets identified visually, aurally, or positionally |
WO2006110803A3 (en) * | 2005-04-12 | 2007-12-13 | Charles Martin Hymes | Wireless communications with proximal targets identified visually, aurally, or positionally |
US8108232B1 (en) * | 2005-05-26 | 2012-01-31 | Sprint Communications Company L.P. | System and method for project contract management |
US9004355B2 (en) | 2005-09-29 | 2015-04-14 | Cardfree Inc | Secure system and method to pay for a service provided at a reservation |
US20070083400A1 (en) * | 2005-09-29 | 2007-04-12 | Katz Jeffrey B | Reservation-based preauthorization payment system |
US20100057503A1 (en) * | 2005-09-29 | 2010-03-04 | The Magellan Network, Llc | Secure system and method to pay for a service provided at a reservation |
US8622292B2 (en) * | 2005-09-29 | 2014-01-07 | Jeffrey Bart Katz | Reservation-based preauthorization payment system |
US20080097777A1 (en) * | 2006-10-23 | 2008-04-24 | Ctm Software Corporation | Electronic document execution |
US8792118B2 (en) | 2007-09-26 | 2014-07-29 | Ringcentral Inc. | User interfaces and methods to provision electronic facsimiles |
US20090080029A1 (en) * | 2007-09-26 | 2009-03-26 | Ringcentral, Inc. | User interfaces and methods to provision electronic facsimiles |
US20090086278A1 (en) * | 2007-09-27 | 2009-04-02 | Ringcentral, Inc. | Electronic facsimile delivery systems and methods |
US11200439B1 (en) | 2008-04-23 | 2021-12-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9846814B1 (en) | 2008-04-23 | 2017-12-19 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9280696B1 (en) | 2008-04-23 | 2016-03-08 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US11600056B2 (en) | 2008-04-23 | 2023-03-07 | CoPilot Ventures III LLC | Authentication method and system |
US11924356B2 (en) | 2008-04-23 | 2024-03-05 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US10275675B1 (en) | 2008-04-23 | 2019-04-30 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US20100128291A1 (en) * | 2008-11-25 | 2010-05-27 | Vlad Vendrow | Authenticated Facsimile Transmission From Mobile Devices |
US8780383B2 (en) * | 2008-11-25 | 2014-07-15 | Ringcentral, Inc. | Authenticated facsimile transmission from mobile devices |
US10120841B2 (en) | 2009-01-29 | 2018-11-06 | International Business Machines Corporation | Automatic generation of assent indication in a document approval function for collaborative document editing |
US20160004670A1 (en) * | 2009-01-29 | 2016-01-07 | International Business Machines Corporation | Automatic generation of assent indication in a document approval function for collaborative document editing |
US9892092B2 (en) * | 2009-01-29 | 2018-02-13 | International Business Machines Corporation | Automatic generation of assent indication in a document approval function for collaborative document editing |
US8924302B2 (en) * | 2009-12-11 | 2014-12-30 | Eoriginal, Inc. | System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents |
US20120086971A1 (en) * | 2009-12-11 | 2012-04-12 | Eoriginal, Inc. | System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents |
US8805594B2 (en) | 2010-05-20 | 2014-08-12 | Piramal Enterprises Limited | Control system for a water distribution system |
US8702977B2 (en) | 2010-05-20 | 2014-04-22 | Piramal Enterprises Limited | Water distribution system |
US20110289549A1 (en) * | 2010-05-24 | 2011-11-24 | Datuit, Llc | Method and system for a document-based knowledge system |
US8931039B2 (en) * | 2010-05-24 | 2015-01-06 | Datuit, Llc | Method and system for a document-based knowledge system |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
US10901696B2 (en) * | 2016-08-19 | 2021-01-26 | International Business Machines Corporation | Validating computer documentation via error detection in a natural language of the computer documentation |
US20220060458A1 (en) * | 2020-08-18 | 2022-02-24 | Fujifilm Business Innovation Corp. | Information processing apparatus and non-transitory computer readable medium |
US11671417B2 (en) * | 2020-08-18 | 2023-06-06 | Fujifilm Business Innovation Corp. | Information processing apparatus and non-transitory computer readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5191613A (en) | Knowledge based system for document authentication | |
US5163091A (en) | Knowledge based system for document authentication (apparatus) | |
US4981370A (en) | Document authentication apparatus | |
US5031214A (en) | Document authentication apparatus | |
JP5190036B2 (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
US8656166B2 (en) | Storage and authentication of data transactions | |
KR100455327B1 (en) | Document authentication system and method | |
US5978475A (en) | Event auditing system | |
US6134327A (en) | Method and apparatus for creating communities of trust in a secure communication system | |
US7162635B2 (en) | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents | |
US6367013B1 (en) | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents | |
US6324645B1 (en) | Risk management for public key management infrastructure using digital certificates | |
US5774552A (en) | Method and apparatus for retrieving X.509 certificates from an X.500 directory | |
US7676433B1 (en) | Secure, confidential authentication with private data | |
AU2002230823B2 (en) | Method and system for obtaining digital signatures | |
US20030028493A1 (en) | Personal information management system, personal information management method, and information processing server | |
US6215872B1 (en) | Method for creating communities of trust in a secure communication system | |
US20020054334A1 (en) | Document transmission Techniques I | |
US20040068470A1 (en) | Distributing public keys | |
US20030221109A1 (en) | Method of and apparatus for digital signatures | |
Russell | Paradigms for verification of authorization at source of electronic documents in an integrated environment | |
JPS59158639A (en) | Automatically collating method and device | |
WO2023014248A1 (en) | Methods and systems for verification method to validate documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20040302 |